lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <dd4d42ef-4c49-46fb-8e90-9b80c1315e92@linux.vnet.ibm.com>
Date: Wed, 17 Jan 2024 15:56:21 -0600
From: Thinh Tran <thinhtr@...ux.vnet.ibm.com>
To: Jakub Kicinski <kuba@...nel.org>
Cc: aelior@...vell.com, davem@...emloft.net, edumazet@...gle.com,
        manishc@...vell.com, netdev@...r.kernel.org, pabeni@...hat.com,
        skalluru@...vell.com, VENKATA.SAI.DUGGI@....com,
        Abdul Haleem <abdhalee@...ibm.com>,
        David Christensen <drc@...ux.vnet.ibm.com>,
        Simon Horman <simon.horman@...igine.com>
Subject: Re: [Patch v6 0/4] bnx2x: Fix error recovering in switch
 configuration

Hi all,

I hope this message finds you well. I'm reaching out to move forward 
with these patches.  If there are any remaining concerns or if 
additional information is needed from my side, please let me know.
Your guidance on the next steps would be greatly appreciated.

Best regards,
Thinh Tran

On 11/16/2023 10:08 AM, Thinh Tran wrote:
> Hi,
> 
> Could we proceed with advancing these patches? They've been in the 
> "Awaiting Upstream" state for a while now. Notably, one of them has 
> successfully made it to the mainline kernel:
>   [v6,1/4] bnx2x: new flag for tracking HW resource
> 
> https://github.com/torvalds/linux/commit/bf23ffc8a9a777dfdeb04232e0946b803adbb6a9
> 
> As testing the latest kernel, we are still encountering crashes due to 
> the absence of one of the patches:
>    [v6,3/4] bnx2x: Prevent access to a freed page in page_pool.
> 
> Is there anything specific I need to do to help moving these patches 
> forward?
> We would greatly appreciate if they could be incorporated into the 
> mainline kernel.
> 
> Thank you,
> Thinh Tran

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ